WPA/WPA2/Remote more secure version of WPA. · WPA/WPA2 WPA

WPA/WPA2/Remote function Call

Wi-Fi Protected Access (WPA) and Wi-Fi
Protected Access II (WPA2) are two different encryption methods and security certification programs to
secure wireless computer networks. WPA was introduced in 2003. For better
802.11 wireless, the Wi-Fi Alliance introduced WPA2 in 2004, which is an
upgraded and a more secure version of WPA.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

·      WPA/WPA2

WPA was introduced after the Wi-Fi Alliance
found that WEP was highly vulnerable to hacker attacks. WPA is more secure than
WEP, however, WPA2 is even more secure than WPA. This is because WPA2 demands
stronger and more advanced wireless encryption than WPA does. Another
difference between WPA and WPA2 is the length of their passwords. WPA generally
requires a shorter password than WPA2 does. This is another reason why WPA2 is
more secure. In WPA2, the user of the wireless network has to enter the
password only one time, however, WPA2 has a specific layer to protect the
network from people who try to hack it. WPA has only one type, however, WPA2
has two versions (WPA2-Personal and
WPA2-Enterprise). Generally, corporations and companies are more likely to
use WPA2-Enterprise because it assigns different credentials to each wireless
user. This decreases their risk of having an ex-employee damaging their
network.

The
most important changes applied on WPA include Message Integrity Check (MIC).
This simply means that WPA makes sure that a hacker did not catch or modify any
of the data transmitted between users and the AP. Another important change
implemented with WPA is the use of TKIP. Instead of having the same key for all
packets, TKIP gives a different key to each packet which enhances the security
of WPA. TKIP was later replaced by AES in WPA2. However, WPA2 still uses TKIP
as a contingency plan.

            Some of WPA advantages is that it uses
more advanced encryption than the previous security protocol (WEP). Also, it uses
a different way of sending keys. WEP significantly changes the key as data
packets are sent across the network. This can be done using a Temporary Key Integrity Protocol (TKIP).
However, WPA also has some disadvantages. One of its biggest issues is that it
does not work on old hardware and operating systems. In addition, WPA takes
long time to transmit data due to its large performance overhead.

            When it comes to WPA2, it also has
some advantages and disadvantages. Some of its advantages is that it fixed the
vulnerabilities that WPA and WEP had. Some of the problems that WPA2 solved are
man-in-the-middle, weak keys, and replay. Another advantage of WPA2 is that it
is more secure. This is because WPA2 requires longer passwords than WPA and
WEP. In addition, WPA2 uses AES encryption, which improves and increases
security. According to Paul Arana, a wireless technology expert, AES is used by
the U.S. government, which proves the strength of AES’s security. Also, recent
researches show that a hacker needs to perform at least 460
operations in order to break an AES key. Furthermore, there are no attacks
committed against AES so far. What makes WPA2 even
more secure is that it uses PMK and Pre-authentication support. These two tools
improve the roaming speed of users between wireless access points.

            As for WPA2’s disadvantages, WPA2 is
vulnerable to DoS attacks such as Botnet and Ping of Death. WPA2 does not
secure management and control frames. This gives a hacker the ability to know
the network diagram and locate the users of the network. This also helps a
hacker to commit different DoS attacks. Compared to WPA, WPA2 needs much more
power to protect your network.  In other
words, in order for WPA2 to work perfectly, you need advanced hardware which is
more expensive than normal hardware. Without powerful hardware, you will end up
having a poor network performance.

·      Remote Function Call

 

 

Works Cited:

Arena, Paul. “Benefits
and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2).” George Mason

University,
September 2006.

Fitzpatrick, Jason. “The
Difference Between WEP, WPA, and WPA2 Wi-Fi Passwords.” How-To

Geek, How-To Geek, 23 Aug. 2017.

Misel, Eli. “Advantages and
Disadvantages of WEP WPA Network Security.” Bright Hub, 19

July
2010.

Mitchell, Bradley. “Learn the
Difference Between WPA2 vs. WPA for Wireless

Security.” Lifewire,
3 Dec. 2017.